1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN""http://www.w3.org/TR/html4/loose.dtd">
8 CONTENT="Modular DocBook HTML Stylesheet Version 1.79"><LINK
10 TITLE="Privoxy Frequently Asked Questions"
11 HREF="index.html"><LINK
14 HREF="configuration.html"><LINK
16 TITLE="Troubleshooting"
17 HREF="trouble.html"><LINK
20 HREF="../p_doc.css"><META
21 HTTP-EQUIV="Content-Type"
23 charset=ISO-8859-1"></HEAD
34 SUMMARY="Header navigation table"
43 >Privoxy Frequently Asked Questions</TH
51 HREF="configuration.html"
88 >4.1. How much does Privoxy slow my browsing down? This
89 has to add extra time to browsing.</A
92 > How much of an impact depends on many things, including the CPU of the host
93 system, how aggressive the configuration is, which specific actions are being triggered,
94 the size of the page, the bandwidth of the connection, etc.</P
96 > Overall, it should not slow you down any in real terms, and may actually help
97 speed things up since ads, banners and other junk are not typically being
98 retrieved and displayed. The actual processing time required by
102 > itself for each page, is relatively small
103 in the overall scheme of things, and happens very quickly. This is typically
104 more than offset by time saved not downloading and rendering ad images and
105 other junk content (if ad blocking is being used).</P
110 > content via the <TT
113 HREF="../user-manual/actions-file.html#FILTER"
121 HREF="../user-manual/actions-file.html#DEANIMATE-GIFS"
126 actions may cause a perceived slowdown, since the entire document
127 needs to be buffered before displaying. And on very large documents,
128 filtering may have some measurable impact. How much depends on the page size,
129 the actual definition of the filter(s), etc. See below. Most other actions
130 have little to no impact on speed.</P
132 > Also, when filtering is enabled but zlib support isn't available, compression
133 is often disabled (see <A
134 HREF="../user-manual/actions-file.html#PREVENT-COMPRESSION"
136 >prevent-compression</A
138 This can have an impact on speed as well, although it's probably smaller than
139 you might think. Again, the page size, etc. will determine how much of an impact.</P
147 >4.2. I notice considerable
148 delays in page requests. What's wrong?</A
154 HREF="../user-manual/actions-file.html#FILTER"
159 such as filtering banners by size, web-bugs etc, or the <TT
162 HREF="../user-manual/actions-file.html#DEANIMATE-GIFS"
167 action, the entire document must be loaded into memory in order for the filtering
168 mechanism to work, and nothing is sent to the browser during this time.</P
170 > The loading time typically does not really change much in real numbers, but
171 the feeling is different, because most browsers are able to start rendering
172 incomplete content, giving the user a feeling of "it works". This effect is
173 more noticeable on slower dialup connections. Extremely large documents
174 may have some impact on the time to load the page where there is filtering
175 being done. But overall, the difference should be very minimal. If there is a
176 big impact, then probably some other situation is contributing (like
177 anti-virus software).
180 > Filtering is automatically disabled for inappropriate MIME types. But note
181 that if the web server mis-reports the MIME type, then content that should
182 not be filtered, could be. <SPAN
186 to differentiate filterable content because of the MIME type as reported by
187 the server, or because of some configuration setting that enables/disables
196 >4.3. What are "http://config.privoxy.org/" and
201 HREF="http://config.privoxy.org/"
203 >http://config.privoxy.org/</A
208 >'s built-in user interface, and
213 > is a shortcut for it.</P
218 > sits between your web browser and the Internet,
219 it can simply intercept requests for these addresses and answer them with its built-in
225 > This also makes for a good test for your browser configuration: If entering the
227 HREF="http://config.privoxy.org/"
229 >http://config.privoxy.org/</A
231 takes you to a page saying <SPAN
233 >"This is Privoxy ..."</SPAN
235 If you get a page saying <SPAN
237 >"Privoxy is not working"</SPAN
239 your browser didn't use <SPAN
243 hence it could not be intercepted, and you have accessed the <SPAN
250 web site at config.privoxy.org.</P
252 > Note that config.privoxy.org resolves to a public IP address.
253 If you use config.privoxy.org as ping or traceroute target you will
254 reach the system on the Internet (Privoxy can't intercept ICMP requests).
255 If you want to ping the system Privoxy runs on,
256 you should use its IP address or local DNS name (if it has got one).</P
264 >4.4. How can I submit new ads, or report
272 various ways to interact with the developers.</P
280 >4.5. If I do submit missed ads, will
281 they be included in future updates?</A
284 > Whether such submissions are eventually included in the
288 > configuration file depends on how
289 significant the issue is. We of course want to address any potential
290 problem with major, high-profile sites such as <I
297 >, etc. Any site with global or regional reach,
298 has a good chance of being a candidate. But at the other end of the spectrum
299 are any number of smaller, low-profile sites such as for local clubs or
300 schools. Since their reach and impact are much less, they are best handled by
301 inclusion in the user's <TT
305 unlikely to be included.</P
313 >4.6. Why doesn't anyone answer my support
317 >Rest assured that it has been read and considered. Why it is not answered,
318 could be for various reasons, including no one has a good answer for it, no
319 one has had time to yet investigate it thoroughly, it has been reported
320 numerous times already, or because not enough information was provided to help
321 us help you. Your efforts are not wasted, and we do appreciate them.</P
329 >4.7. How can I hide my IP address?</A
332 > If you run both the browser and <SPAN
335 > locally, you cannot hide your IP
339 > or ultimately any other
340 software alone. The server needs to know your IP address so that it knows
341 where to send the responses back.</P
343 > There are many publicly usable "anonymous" proxies out there, which
344 provide a further level of indirection between you and the web server.</P
346 > However, these proxies are called "anonymous" because you don't need
347 to authenticate, not because they would offer any real anonymity.
348 Most of them will log your IP address and make it available to the
349 authorities in case you violate the law of the country they run in. In fact
350 you can't even rule out that some of them only exist to *collect* information
351 on (those suspicious) people with a more than average preference for privacy.</P
353 > If you want to hide your IP address from most adversaries,
354 you should consider chaining <SPAN
359 HREF="https://www.torproject.org/"
363 The configuration details can be found in
384 >4.8. Can Privoxy guarantee I am anonymous?</A
387 > No. Your chances of remaining anonymous are improved, but unless you
399 or a similar proxy and know what you're doing when it comes to configuring
400 the rest of your system, you should assume that everything you do
401 on the Web can be traced back to you.</P
406 > can remove various information about you,
413 > more freedom to decide which sites
414 you can trust, and what details you want to reveal. But it neither
415 hides your IP address, nor can it guarantee that the rest of the system
416 behaves correctly. There are several possibilities how a web sites can find
417 out who you are, even if you are using a strict <SPAN
421 configuration and chained it with <SPAN
429 > privacy-enhancing features can be easily subverted
430 by an insecure browser configuration, therefore you should use a browser that can
431 be configured to only execute code from trusted sites, and be careful which sites you trust.
432 For example there is no point in having <SPAN
436 modify the User-Agent header, if websites can get all the information they want
437 through JavaScript, ActiveX, Flash, Java etc.</P
439 > A few browsers disclose the user's email address in certain situations, such
440 as when transferring a file by FTP. <SPAN
444 does not filter FTP. If you need this feature, or are concerned about the
445 mail handler of your browser disclosing your email address, you might
446 consider products such as <SPAN
451 > Browsers available only as binaries could use non-standard headers to give
452 out any information they can have access to: see the manufacturer's license
453 agreement. It's impossible to anticipate and prevent every breach of privacy
454 that might occur. The professionally paranoid prefer browsers available as
455 source code, because anticipating their behavior is easier. Trust the source,
464 >4.9. A test site says I am not using a Proxy.</A
467 > Good! Actually, they are probably testing for some other kinds of proxies.
468 Hiding yourself completely would require additional steps.</P
476 >4.10. How do I use Privoxy
477 together with Tor?</A
480 > Before you configure <SPAN
485 HREF="https://www.torproject.org/"
494 HREF="../user-manual/installation.html"
499 HREF="../user-manual/startup.html"
506 > itself is setup correctly.</P
508 > If it is, refer to <A
509 HREF="https://www.torproject.org/documentation.html"
512 extensive documentation</A
513 > to learn how to install <SPAN
520 >'s logfile says that
523 >"Tor has successfully opened a circuit"</SPAN
527 >"looks like client functionality is working"</SPAN
537 isn't working, their combination most likely will neither. Testing them on their
538 own will also help you to direct problem reports to the right audience.
542 > isn't working, don't bother the
546 > developers. If <SPAN
550 isn't working, don't send bug reports to the <SPAN
555 > If you verified that <SPAN
562 are working, it is time to connect them. As far as <SPAN
569 > is just another proxy that can be reached
570 by socks4, socks4a and socks5. Most likely you are interested in <SPAN
574 to increase your anonymity level, therefore you should use socks5, to make sure DNS
575 requests are done through <SPAN
578 > and thus invisible to your
579 local network. Using socks4a would work too, but with socks5 you get more precise error
587 HREF="../user-manual/config.html"
589 >main configuration file</A
591 is already prepared for <SPAN
594 >, if you are using a
598 > configuration and run it on the same
602 >, you just have to edit the
604 HREF="../user-manual/config.html#FORWARDING"
606 >forwarding section</A
608 and uncomment the line:</P
617 ># forward-socks5t / 127.0.0.1:9050 .</PRE
622 > Note that if you got Tor through one of the bundles, you may
623 have to change the port from 9050 to 9150 (or even another one).
624 For details, please check the documentation on the
626 HREF="https://torproject.org/"
631 > This is enough to reach the Internet, but additionally you might want to
632 uncomment the following forward rules, to make sure your local network is still
633 reachable through Privoxy:</P
642 ># forward 192.168.*.*/ .
643 # forward 10.*.*.*/ .
644 # forward 127.*.*.*/ .</PRE
649 > Unencrypted connections to systems in these address ranges will
650 be as (un)secure as the local network is, but the alternative is
651 that your browser can't reach the network at all. Then again,
652 that may actually be desired and if you don't know for sure
653 that your browser has to be able to reach the local network,
654 there's no reason to allow it.</P
656 > If you want your browser to be able to reach servers in your local
657 network by using their names, you will need additional exceptions
658 that look like this:</P
667 ># forward localhost/ .</PRE
672 > Save the modified configuration file and open
674 HREF="http://config.privoxy.org/show-status"
676 >http://config.privoxy.org/show-status</A
678 in your browser, confirm that <SPAN
681 > has reloaded its configuration
682 and that there are no other forward lines, unless you know that you need them. If everything looks good,
685 HREF="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate"
689 > to learn how to verify that you are really using <SPAN
694 > Afterward, please take the time to at least skim through the rest
698 > documentation. Make sure you understand
702 > does, why it is no replacement for
703 application level security, and why you probably don't want to
704 use it for unencrypted logins.</P
712 >4.11. Might some things break because header information or
713 content is being altered?</A
716 > Definitely. It is common for sites to use browser type, browser version,
717 HTTP header content, and various other techniques in order to dynamically
718 decide what to display and how to display it. What you see, and what I see,
719 might be very different. There are many, many ways that this can be handled,
720 so having hard and fast rules, is tricky.</P
725 > is sometimes used in this way to identify
726 the browser, and adjust content accordingly.</P
728 > Also, different browsers use different encodings of non-English
729 characters, certain web servers convert pages on-the-fly according to the
730 User Agent header. Giving a <SPAN
734 operating system or browser manufacturer causes some sites in these languages
735 to be garbled; Surfers to Eastern European sites should change it to
736 something closer. And then some page access counters work by looking at the
740 > header; they may fail or break if unavailable. The
741 weather maps of Intellicast have been blocked by their server when no
745 > or cookie is provided, is another example. (But you
746 can forge both headers without giving information away). There are
747 many other ways things can go wrong when trying to fool a web server. The
748 results of which could inadvertently cause pages to load incorrectly,
749 partially, or even not at all. And there may be no obvious clues as to just
750 what went wrong, or why. Nowhere will there be a message that says
766 > Similar thoughts apply to modifying JavaScript, and, to a lesser degree,
769 > If you have problems with a site, you will have to adjust your configuration
770 accordingly. Cookies are probably the most likely adjustment that may
771 be required, but by no means the only one.</P
779 >4.12. Can Privoxy act as a <SPAN
783 speed up web browsing?</A
786 > No, it does not have this ability at all. You want something like
788 HREF="http://www.squid-cache.org/"
793 HREF="http://www.pps.jussieu.fr/~jch/software/polipo/"
797 And, yes, before you ask, <SPAN
801 with other kinds of proxies like <SPAN
806 HREF="../user-manual/config.html#FORWARDING"
811 HREF="../user-manual/index.html"
823 >4.13. What about as a firewall? Can Privoxy protect me?</A
826 > Not in the way you mean, or in the way some firewall vendors claim they can.
830 > can help protect your privacy, but can't
831 protect your system from intrusion attempts. It is, of course, perfectly possible
846 >4.14. I have large empty spaces / a checkerboard pattern now where
847 ads used to be. Why?</A
850 > It is technically possible to eliminate banners and ads in a way that frees
851 their allocated page space. This could easily be done by blocking with
856 and eliminating the <SPAN
862 > image references from the
865 > But, this would consume considerably more CPU resources (IOW, slow things
866 down), would likely destroy the layout of some web pages which rely on the
867 banners utilizing a certain amount of page space, and might fail in other
868 cases, where the screen space is reserved (e.g. by HTML tables for instance).
869 Also, making ads and banners disappear without any trace complicates
870 troubleshooting, and would sooner or later be problematic.</P
872 > The better alternative is to instead let them stay, and block the resulting
873 requests for the banners themselves as is now the case. This leaves either
874 empty space, or the familiar checkerboard pattern.</P
876 > So the developers won't support this in the default configuration, but you
877 can of course define appropriate filters yourself to achieve this.</P
885 >4.15. How can Privoxy filter Secure (HTTPS) URLs?</A
888 > Since secure HTTP connections are encrypted SSL sessions between your browser
889 and the secure site, and are meant to be reliably <SPAN
896 there is little that <SPAN
899 > can do but hand the raw
900 gibberish data though from one end to the other unprocessed.</P
902 > The only exception to this is blocking by host patterns, as the client needs
906 > the name of the remote server,
910 > can establish the connection.
911 If that name matches a host-only pattern, the connection will be blocked.</P
913 > As far as ad blocking is concerned, this is less of a restriction than it may
914 seem, since ad sources are often identifiable by the host name, and often
915 the banners to be placed in an encrypted page come unencrypted nonetheless
916 for efficiency reasons, which exposes them to the full power of
924 >"Content cookies"</SPAN
925 > (those that are embedded in the actual HTML or
926 JS page content, see <TT
929 HREF="../user-manual/actions-file.html#FILTER-CONTENT-COOKIES"
931 >filter{content-cookies}</A
934 in an SSL transaction will be impossible to block under these conditions.
935 Fortunately, this does not seem to be a very common scenario since most
936 cookies come by traditional means.</P
944 >4.16. Does Privoxy support HTTP/2?</A
947 > Privoxy currently doesn't parse HTTP/2 but applications
948 can tunnel HTTP/2 through Privoxy if Privoxy is configured
949 to allow CONNECT requests (default) which are also used
952 > Adding HTTP/2 support is on the TODO list but currently
953 nobody is known to work on it.</P
961 >4.17. Privoxy runs as a <SPAN
965 secure is it? Do I need to take any special precautions?</A
968 > On Unix-like systems, <SPAN
971 > can run as a non-privileged
972 user, which is how we recommend it be run. Also, by default
976 > listens to requests from <SPAN
982 > The server aspect of <SPAN
985 > is not itself directly
986 exposed to the Internet in this configuration. If you want to have
990 > serve as a LAN proxy, this will have to
991 be opened up to allow for LAN requests. In this case, we'd recommend
992 you specify only the LAN gateway address, e.g. 192.168.1.1, in the main
996 > configuration file and check all <A
997 HREF="../user-manual/config.html#ACCESS-CONTROL"
999 >access control and security
1001 >. All LAN hosts can then use this as their proxy address
1002 in the browser proxy configuration, but <SPAN
1006 will not listen on any external interfaces. ACLs can be defined in addition,
1007 and using a firewall is always good too. Better safe than sorry.</P
1015 >4.18. Can I temporarily disable Privoxy?</A
1021 > doesn't have a transparent proxy mode,
1022 but you can toggle off blocking and content filtering.</P
1024 > The easiest way to do that is to point your browser
1025 to the remote toggle URL: <A
1026 HREF="http://config.privoxy.org/toggle"
1028 >http://config.privoxy.org/toggle</A
1032 HREF="../user-manual/appendix.html#BOOKMARKLETS"
1034 >Bookmarklets section</A
1039 > for an easy way to access this
1040 feature. Note that this is a feature that may need to be enabled in the main
1055 > is Privoxy totally
1056 out of the picture?</A
1059 > No, this just means all optional filtering and actions are disabled.
1063 > is still acting as a proxy, but just
1064 doing less of the things that <SPAN
1068 normally be expected to do. It is still a <SPAN
1072 the interaction between your browser and web sites. See below to bypass
1081 >4.20. How can I tell Privoxy to totally ignore certain sites?</A
1084 > Bypassing a proxy, or proxying based on arbitrary criteria, is purely a browser
1085 configuration issue, not a <SPAN
1088 > issue. Modern browsers typically do have
1089 settings for not proxying certain sites. Check your browser's help files.</P
1097 >4.21. My logs show Privoxy <SPAN
1101 ads, but also its own internal CGI pages. What is a <SPAN
1120 >, nothing more. Often this is indeed ads or
1124 > uses the same mechanism for
1125 trapping requests for its own internal pages. For instance, a request for
1129 > configuration page at: <A
1130 HREF="http://config.privoxy.org"
1132 >http://config.privoxy.org</A
1134 intercepted (i.e. it does not go out to the 'net), and the familiar CGI
1135 configuration is returned to the browser, and the log consequently will show
1141 > Since version 3.0.7, Privoxy will also log the crunch reason.
1142 If you are using an older version you might want to upgrade.</P
1150 >4.22. Can Privoxy affect files that I download
1151 from a webserver? FTP server?</A
1154 > From the webserver's perspective, there is no difference between
1155 viewing a document (i.e. a page), and downloading a file. The same is true of
1159 >. If there is a match for a <TT
1162 HREF="../user-manual/actions-file.html#BLOCK"
1167 it will still be blocked, and of course this is obvious.
1170 > Filtering is potentially more of a concern since the results are not always
1171 so obvious, and the effects of filtering are there whether the file is simply
1172 viewed, or downloaded. And potentially whether the content is some obnoxious
1173 advertisement, or Mr. Jimmy's latest/greatest source code jewel. Of course,
1174 one of these presumably is <SPAN
1177 > content that we don't want, and
1181 > content that we do want.
1185 > is blind to the differences, and can only
1188 >"good from bad"</SPAN
1189 > by the configuration parameters
1201 > knows the differences in files according
1204 >"Content Type"</SPAN
1205 > as reported by the webserver. If this is
1206 reported accurately (e.g. <SPAN
1208 >"application/zip"</SPAN
1209 > for a zip archive),
1213 > knows to ignore these where
1217 > potentially can filter HTML
1218 as well as plain text documents, subject to configuration parameters of
1219 course. Also, documents that are of an unknown type (generally assumed to be
1223 >) can be filtered, as will those that might be
1224 incorrectly reported by the webserver. If such a file is a downloaded file
1225 that is intended to be saved to disk, then any content that might have been
1226 altered by filtering, will be saved too, for these (probably rare) cases.</P
1228 > Note that versions later than 3.0.2 do NOT filter document types reported as
1232 >. Prior to this, <SPAN
1236 did filter this document type.</P
1238 > In short, filtering is <SPAN
1241 > if a) the content type as reported
1242 by the webserver is appropriate <SPAN
1248 > b) the configuration
1249 allows it (or at least does not disallow it). That's it. There is no magic
1250 cookie anywhere to say this is <SPAN
1257 >. It's the configuration that lets it all happen or not.</P
1259 > If you download text files, you probably do not want these to be filtered,
1260 particularly if the content is source code, or other critical content. Source
1261 code sometimes might be mistaken for Javascript (i.e. the kind that might
1262 open a pop-up window). It is recommended to turn off filtering for download
1263 sites (particularly if the content may be plain text files and you are using
1264 version 3.0.2 or earlier) in your <TT
1268 also, for any site or page where making <SPAN
1275 all to the content is to be avoided.</P
1280 > does not do FTP at all, only HTTP
1281 and HTTPS (SSL) protocols.</P
1289 >4.23. I just downloaded a Perl script, and Privoxy
1290 altered it! Yikes, what is wrong!</A
1293 > Please read above.</P
1301 >4.24. Should I continue to use a <SPAN
1304 > file for ad-blocking?</A
1307 > One time-tested technique to defeat common ads is to trick the local DNS
1308 system by giving a phony IP address for the ad generator in the local
1312 > file, typically using <TT
1319 >. This effectively blocks the ad.</P
1321 > There is no reason to use this technique in conjunction with
1329 does essentially the same thing, much more elegantly and with much more
1330 flexibility. A large <TT
1333 > file, in fact, not only
1334 duplicates effort, but may get in the way and seriously slow down your system.
1335 It is recommended to remove such entries from your <TT
1338 > file. If you think
1339 your hosts list is neglected by <SPAN
1343 configuration, consider adding your list to your <TT
1358 ads.galore.example.com
1359 etc.example.com</PRE
1370 >4.25. Where can I find more information about Privoxy
1371 and related issues?</A
1374 > Other references and sites of interest to <SPAN
1387 HREF="https://www.privoxy.org/"
1389 >https://www.privoxy.org/</A
1409 HREF="https://www.privoxy.org/faq/"
1411 >https://www.privoxy.org/faq/</A
1431 HREF="https://www.privoxy.org/developer-manual/"
1433 >https://www.privoxy.org/developer-manual/</A
1453 HREF="https://sourceforge.net/projects/ijbswa/"
1455 >https://sourceforge.net/projects/ijbswa/</A
1457 the Project Page for <SPAN
1462 HREF="http://sourceforge.net"
1480 HREF="http://config.privoxy.org/"
1482 >http://config.privoxy.org/</A
1484 the web-based user interface. <SPAN
1488 running for this to work. Shortcut: <A
1507 HREF="https://sourceforge.net/tracker/?group_id=11118&atid=460288"
1509 >https://sourceforge.net/tracker/?group_id=11118&atid=460288</A
1514 configuration related suggestions to the developers.
1529 HREF="http://www.squid-cache.org/"
1531 >http://www.squid-cache.org/</A
1533 caching proxy, which is often used together with <SPAN
1551 HREF="http://www.pps.univ-paris-diderot.fr/~jch/software/polipo/"
1553 >http://www.pps.univ-paris-diderot.fr/~jch/software/polipo/</A
1558 > is a caching proxy with advanced features
1559 like pipelining, multiplexing and caching of partial instances. In many setups
1560 it can be used as <SPAN
1578 HREF="https://www.torproject.org/"
1580 >https://www.torproject.org/</A
1585 > can help anonymize web browsing,
1586 web publishing, instant messaging, IRC, SSH, and other applications.
1600 >4.26. I've noticed that Privoxy changes <SPAN
1607 >! Why are you manipulating my browsing?</A
1610 > We're not. The text substitutions that you are seeing are disabled
1611 in the default configuration as shipped. You have either manually
1619 is clearly labeled <SPAN
1621 >"Text replacements for subversive browsing
1623 > or you are using an older Privoxy version and have implicitly
1624 activated it by choosing the <SPAN
1628 web-based editor. Please upgrade.</P
1636 >4.27. Does Privoxy produce <SPAN
1639 > HTML (or XHTML)?</A
1642 > Privoxy generates HTML in both its own <SPAN
1646 whenever there are text substitutions via a <SPAN
1649 > filter. While this
1650 should always conform to the HTML 4.01 specifications, it has not been
1651 validated against this or any other standard.</P
1658 NAME="SURPRISE-PRIVOXY"
1659 >4.28. How did you manage to get Privoxy on my computer without my consent?</A
1662 > We didn't. We make Privoxy available for download, but we don't go
1663 around installing it on other people's systems behind their back.
1664 If you discover Privoxy running on your system and are sure you didn't
1665 install it yourself, somebody else did. You may not even be running
1666 the real Privoxy, but maybe something else that only pretends to be
1667 Privoxy, or maybe something that is based on the real Privoxy,
1668 but has been modified.</P
1670 > Lately there have been reports of problems with some kind of
1671 "parental control" software based on Privoxy that came preinstalled on
1673 HREF="https://sourceforge.net/p/ijbswa/bugs/813/"
1677 The problems described are inconsistent with the behaviour of official
1678 Privoxy versions, which suggests that the preinstalled software may
1679 contain vendor modifications that we don't know about and thus can't debug.</P
1682 HREF="copyright.html"
1685 modifications, but the vendor has to comply with the license,
1686 which involves informing the user about the changes and to make
1687 the changes available under the same license as Privoxy itself.</P
1689 > If you are having trouble with a modified Privoxy version,
1690 please try to talk to whoever made the modifications before
1691 reporting the problem to us. Please also try to convince
1692 whoever made the modifications to talk to us. If you think
1693 somebody gave you a modified Privoxy version without complying
1694 to the license, please let us know.</P
1702 SUMMARY="Footer navigation table"
1713 HREF="configuration.html"
1751 >Troubleshooting</TD